Deck 3: Cyberattacks and Cybersecurity
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/60
Play
Full screen (f)
Deck 3: Cyberattacks and Cybersecurity
1
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
True
2
After virus eradication, you can use a previous backup to restore an infected computer.
False
3
Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
True
4
Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
5
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
6
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
7
Computer forensics is such a new field that there is little training or certification processes available.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
8
Whenever possible, automated system rules should mirror an organization's written policies.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
9
Trojan horse has become an umbrella term for many types of malicious code.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
10
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
11
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
12
The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
13
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
14
Today's computer menace is much better organized and may be part of an organized group.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
15
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
16
Cyberterrorism is the intimidation of government or civilian population by using information technology to disable critical national infrastructure to achieve political, religious, or ideological goals.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
17
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
18
Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user's consent or knowledge.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
19
A security policy outlines exactly what needs to be done to safeguard computers and their data, but not how it must be accomplished.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
20
A spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
21
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?
A)DDoS
B)APT
C)rootkit
D)trojan horse
A)DDoS
B)APT
C)rootkit
D)trojan horse
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
22
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
23
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
A)exploit
B)patch
C)firewall
D)security audit
A)exploit
B)patch
C)firewall
D)security audit
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?
A)denial-of-service attack
B)logic bomb
C)botnet
D)rootkit
A)denial-of-service attack
B)logic bomb
C)botnet
D)rootkit
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?
A)USA Patriot Act
B)Computer Fraud and Abuse Act
C)Stored Wire and Electronic Communications and Transactional Records Access Statutes
D)Identity Theft and Assumption Deterrence Act
A)USA Patriot Act
B)Computer Fraud and Abuse Act
C)Stored Wire and Electronic Communications and Transactional Records Access Statutes
D)Identity Theft and Assumption Deterrence Act
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?
A)Carnegie Mellon's Computer Response Team
B)U.S.Computer Emergency Readiness Team
C)The National Institute of Standards and Technology
D)The Science and Technology Directorate of Homeland Security
A)Carnegie Mellon's Computer Response Team
B)U.S.Computer Emergency Readiness Team
C)The National Institute of Standards and Technology
D)The Science and Technology Directorate of Homeland Security
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?
A)competitive intelligence
B)reasonable assurance
C)separation of duties
D)risk assessment
A)competitive intelligence
B)reasonable assurance
C)separation of duties
D)risk assessment
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
28
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
29
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?
A)anti-virus device
B)intrusion prevention system
C)intrusion detection system
D)virtual private network
A)anti-virus device
B)intrusion prevention system
C)intrusion detection system
D)virtual private network
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
30
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
31
What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?
A)A botnet
B)Spam
C)Logic bombing
D)A worm
A)A botnet
B)Spam
C)Logic bombing
D)A worm
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
32
Which type of attacker hacks computers or websites in an attempt to promote a political ideology?
A)Industrial spies
B)Hackers
C)Cyberterrorists
D)Hacktivists
A)Industrial spies
B)Hackers
C)Cyberterrorists
D)Hacktivists
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
33
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?
A)patch
B)bot
C)rootkit
D)Trojan horse
A)patch
B)bot
C)rootkit
D)Trojan horse
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
34
What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VBScript?
A)Macro viruses
B)Logic bombs
C)Trojan horses
D)Zombies
A)Macro viruses
B)Logic bombs
C)Trojan horses
D)Zombies
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
35
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
36
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?
A)valid test results
B)correct system login ids
C)the correct date and time
D)sufficient memory for operations
A)valid test results
B)correct system login ids
C)the correct date and time
D)sufficient memory for operations
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?
A)logic bomb
B)zombie
C)dropper code
D)loader
A)logic bomb
B)zombie
C)dropper code
D)loader
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
38
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?
A)distributed denial-of-service attack
B)bot attack
C)CAPTCHA attack
D)logic bomb
A)distributed denial-of-service attack
B)bot attack
C)CAPTCHA attack
D)logic bomb
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
39
A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?
A)industrial spy
B)hacktivist
C)black hat hacker
D)cybercriminal
A)industrial spy
B)hacktivist
C)black hat hacker
D)cybercriminal
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
40
Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
41
Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?
A)trojan horse
B)worm
C)ransomware
D)phishing
A)trojan horse
B)worm
C)ransomware
D)phishing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
42
Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?
A)Spamdexing
B)Vishing
C)Smishing
D)Spear phishing
A)Spamdexing
B)Vishing
C)Smishing
D)Spear phishing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
43
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
A)logic bomb
B)DDoS attack
C)zero-day attack
D)rootkit
A)logic bomb
B)DDoS attack
C)zero-day attack
D)rootkit
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
44
An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?
A)script kiddie
B)virus signature
C)CAPTCHA
D)Trojan horse
A)script kiddie
B)virus signature
C)CAPTCHA
D)Trojan horse
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
45
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?
A)Pharming
B)Phishing
C)Spamdexing
D)Flyposting
A)Pharming
B)Phishing
C)Spamdexing
D)Flyposting
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?
A)firewall
B)social network
C)intrusion detection device
D)virtual private network
A)firewall
B)social network
C)intrusion detection device
D)virtual private network
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
47
Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?
A)Department of Homeland Security
B)IEEE
C)SANS Institute
D)US-CERT
A)Department of Homeland Security
B)IEEE
C)SANS Institute
D)US-CERT
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
48
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
49
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?
A)firewall
B)security dashboard
C)intrusion detection software
D)proxy server software
A)firewall
B)security dashboard
C)intrusion detection software
D)proxy server software
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
50
Briefly describe ransomware and how a computer typically becomes infected with this type of malware.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
51
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?
A)virus
B)operating system
C)zombie
D)CAPTCHA
A)virus
B)operating system
C)zombie
D)CAPTCHA
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
52
A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?
A)USA Patriot Act
B)Bring your own device (BYOD)
C)Mobile Alliance Policy (MAP)
D)CAPTCHA
A)USA Patriot Act
B)Bring your own device (BYOD)
C)Mobile Alliance Policy (MAP)
D)CAPTCHA
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
53
The most common computer security precaution taken by businesses is the installation of which of the following?
A)emergency response team
B)rootkit
C)virtual private network
D)firewall
A)emergency response team
B)rootkit
C)virtual private network
D)firewall
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
54
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?
A)spam
B)rootkit
C)logic bomb
D)distributed denial-of-service
A)spam
B)rootkit
C)logic bomb
D)distributed denial-of-service
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
55
Identify and briefly discuss five reasons why the number, variety, and impact of security incidents is increasing.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
56
Briefly explain why many organizations are choosing to outsource their network security operations to a managed security service provider (MSSP).
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
57
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
58
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?
A)security dashboard
B)computer forensics
C)managed security service provider
D)product lifecycle management
A)security dashboard
B)computer forensics
C)managed security service provider
D)product lifecycle management
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
59
Before the IT security group can begin an eradication effort, it must:
A)seek permission of the firm's legal counsel
B)collect and log all possible criminal evidence from the system
C)consider the potential for negative publicity
D)develop an estimate for the monetary damage caused
A)seek permission of the firm's legal counsel
B)collect and log all possible criminal evidence from the system
C)consider the potential for negative publicity
D)develop an estimate for the monetary damage caused
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
60
The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?
A)whistleblowing
B)cyberterrorism
C)hacktivism
D)cyberespionage
A)whistleblowing
B)cyberterrorism
C)hacktivism
D)cyberespionage
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck